Administrators use ____ logs that provide a detailed description of activity on the system.
A. file
B. directory
C. detailed
D. system
Answer: D
Computer Science & Information Technology
You might also like to view...
Which of the following information does an attacker enumerate by analyzing the AWS error messages that reveal information regarding the existence of a user?
A. Enumerating AWS account IDs B. Enumerating S3 buckets C. Enumerating IAM roles D. Enumerating bucket permissions
Computer Science & Information Technology
What is the purpose of a protocol analyzer?
What will be an ideal response?
Computer Science & Information Technology